EP1766565A4 - Apparatus and method for managing digital rights with arbitration - Google Patents
Apparatus and method for managing digital rights with arbitrationInfo
- Publication number
- EP1766565A4 EP1766565A4 EP05762245A EP05762245A EP1766565A4 EP 1766565 A4 EP1766565 A4 EP 1766565A4 EP 05762245 A EP05762245 A EP 05762245A EP 05762245 A EP05762245 A EP 05762245A EP 1766565 A4 EP1766565 A4 EP 1766565A4
- Authority
- EP
- European Patent Office
- Prior art keywords
- content
- key
- user
- rights
- sender
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 239000000725 suspension Substances 0.000 claims abstract description 36
- 238000004590 computer program Methods 0.000 claims description 23
- 238000012544 monitoring process Methods 0.000 claims description 8
- 238000012552 review Methods 0.000 claims description 5
- 230000008569 process Effects 0.000 description 7
- 230000009471 action Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 230000006378 damage Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000002093 peripheral effect Effects 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000011900 installation process Methods 0.000 description 2
- 230000007257 malfunction Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000001627 detrimental effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000009666 routine test Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Definitions
- the present invention relates to the management of digital rights between untrusting parties and, more particularly, to techniques that utilize a trusted party to resolve disputes between the untrusting parties, at least on a temporary basis.
- Licensing of electronic (i.e., digital) content, particularly software programs, has traditionally relied on certain "trust” or “rights” models wherein a content provider (or licensor) has certain ownership rights to electronic content such as, for example, software, music, video, images, or other useful electronic information.
- the user e.g., a licensee
- the content provider will typically require that the user agree to, and abide by, the terms of a license agreement which sets forth the user's rights and restrictions for using the electronic content.
- the content provider presumes the user to be honest, trustworthy, and willing to abide by the terms of the license.
- the user likewise, presumes the content provider to be honest, trustworthy, and also willing to abide by the terms of the license. In reality, however, the content provider and end user do not trust each other.
- the content provider is concerned that the user will disregard the terms of the license and, for example, distribute copies of the electronic content illegally. For example, if the electronic content is software, music, or a movie, the user may create copies and distribute them to friends. The user is concerned that the content provider may inappropriately terminate the use of the electronic content even though the terms of the license have not been violated. There are other conditions that may cause concern to the user and content provider.
- the content provider may require acceptance of a software license which dictates that the software is to be installed and used on a single computer, or that the software be used until a predetermined license expiration date (e.g., one year), at which time the license may be renewed.
- a software license which dictates that the software is to be installed and used on a single computer, or that the software be used until a predetermined license expiration date (e.g., one year), at which time the license may be renewed.
- a predetermined license expiration date e.g., one year
- the content provider can include monitoring software to detect actions that may be in violation of the license agreement. If the monitoring software detects such an action, then the content can be immediately disabled or otherwise locked to prevent further violations.
- One technique that has been developed to address some of these problems includes implementation of a "trust” or "rights” management system on the computer for purposes of monitoring the manner in which the content is used. These rights management systems may take a wide variety of forms, as discussed in co-pending application 10/740,391 filed Dec. 18, 2003 entitled “Rights Management System” and having common ownership.
- a trusted party is used to address potential rights violations and provide at least a temporary remedy for using the content until a permanent resolution can be reached.
- a method is provided for controlling access to a digital (i.e. electronic) content. The method allows receipt of a notice regarding suspension of a sender's rights to use the content. The notice is reviewed to retrieve information regarding the content and the sender's rights for using the content. Next, a key capable of restoring the sender's access to the content is generated. The key is transmitted to the sender in order to terminate the suspension of rights to use the content. Finally, information regarding at least the sender and the key is documented.
- a user's rights to access a digital content can be restored, while information is documented to verify an extension for the user to access the content.
- One specific implementation of the invention requires that the sender of the notice supply proof of ownership and/or authorization to access the content. This can be, for example, in the form of original licensing information supplied by the content provider.
- the key can also be generated such that it expires after a predetermined length of time. Such a feature allows the user to resolve any licensing issues with the content provider without being wrongfully denied access to the content.
- a method is provided for managing rights to a digital content. The method initially requires that a user accept the terms of a license agreement specifying rights to use the content.
- Other features of the present invention provide the capability of linking the content to a single hardware unit. This can be done, for example, by retrieving an identification number from a non- volatile storage area of the hardware unit being used to access the content.
- the hardware unit can be in the form of various devices including computer systems, CD players, DVD players, etc.
- the key would then be encrypted with the identification number to create an encrypted qualifier that establishes a unique relationship between the key and the identification number.
- the qualifier can then be monitored for tampering. If any tampering is detected, the user's access to the content would be suspended.
- Various types of monitoring software can also be installed on the hardware unit to identify violations that would require suspension of the user's access rights.
- the term content refers to any type of digital data and/or information.
- the data can be software code (i.e., software program) capable of being executed by a computer system.
- the data can also be music, a video, or video containing music and/or other sounds.
- the data can also be a full-length movie.
- hardware or hardware unit
- the hardware would correspond to a standard DVD player, or any device capable of playing a DVD. If the data is in the form of software or data files, then the hardware would be a computer system having the appropriate operating system for accessing the data. Such operating systems include, but are not limited to, Linux, Unix, Windows, and MacOs. Oftentimes, however, a computer system will be appropriate for most, if not all, data due to the ability to add various components and peripherals such as CD and DVD drives. Furthermore, the hardware can be in the form of portable devices such as mobile phones, PDAs, and other similar devices. A content provider can provide monitoring software capable of detecting violations of a license agreement.
- the monitoring software would typically be provided together with the content. Upon detection of a possible violation, the monitoring software would typically restrict, or suspend, the user's access to the content. This action takes place because the content provider generally does not trust the user to abide by the terms of the license agreement. The user, on the other hand, does not trust the content provider to verify, or take appropriate steps to verify, that the terms of the license agreement are truly being violated. Various concerns are thus raised by both parties.
- the present invention advantageously addresses the trust concerns of both the user and the content provider through the use of a trusted third party (i.e., a moderator or arbiter). Accordingly, the user can be assured that his rights to the content will not be violated or restricted.
- the security component 180 can be part of the operating system or other standard part of the computer system 100.
- the computer system 100 can also include one or more rights management components 170 to monitor and control use of electronic content 160 obtained under certain licensing agreements.
- Rights management components 170 are 'trusted' from the perspective of, for example, a content provider or licensor, and in the sense that they prevent unauthorized use and/or copying of the electronic content 160 (e.g., use that is not in compliance with license terms).
- the rights management components 170 are typically provided by, or under the control of, the content provider.
- Rights management components 170 may include any of software, BIOS routines, hardware, etc. (or combinations thereof).
- the rights management components 170 may be included and installed as a component of the electronic content 160, particularly when in the form of software programs.
- the rights management components may be activated during installation and execution of the electronic content 160.
- the rights management components can rely on information (possibly encrypted) that is stored on media carrying the content. The hardware would check the information on the media to determine authenticity.
- the rights management components 170 would control and prevent unauthorized use of electronic content 160 by monitoring for activities that are not in compliance with the terms of the license agreement (i.e., license terms associated with the content 160).
- the rights management components 170 may save the data of a word processing program to the data area 150. Once this information has been saved, the rights management components 170 could terminate execution of, or disable, the content. Depending on the specific rights management components 170, the user may or may not receive access to unsaved data once a violation has been detected.
- the present invention advantageously allows the user to contact an arbiter capable of restoring access to the content by providing an indication, to the rights management components 170, that the user is now in compliance with the terms of the license agreement. This can be done for example by providing the user with a replacement key (or license information) capable of restoring access for a temporary or permanent basis.
- the content provider 210 enters into a transaction wherein, for example, the user 212 will obtain certain rights to use the content 216.
- this transaction is in the form of a purchase or sale.
- the content provider 210 may act through various representatives, such as a retail establishment.
- the user 212 pays a fee to the content provider 210 in exchange for the content 216, or an authorized copy thereof.
- the content provider 210 will request that the user 212 agree to the terms of one or more license agreements.
- the content provider 210 provides the user 212 with access to the content 216. This can be in the form of a key or other unique identifier. Alternatively, information can be stored on the medium carrying the content to provide authentication. Various other means can also be used.
- the license agreement is structured such that it protects the content provider 210 from violations by the user 212.
- the content provider 210 may provide the user 212 with unrestricted access to the content 216. However, this access does not extend to the user's associates, friends, etc. Therefore copying and redistributing the content 216 would be considered a violation of the license agreement.
- the content provider 210 may provide the user 212 with unrestricted access to the content 216 from a single hardware unit 218. For example, a particular software program may be licensed to the user 212 for use on a single computer system.
- a content provider 210 may allow a user 212 to download a movie or video for access on a single computer. The access rights given to the user 212 would not extend to copying of the video to a portable medium, such as a DVD disc, and watching the movie on a different computer, or redistributing the copied discs to friends.
- the content provider 210 can install special rights management components 170 (e.g., in the form of monitoring software) on the hardware unit 218 in order to detect violations of the license agreement.
- a software program installed on the user's computer could install a rights management component to continuously monitor use of the software on the user's machine and identify instances of violations of the license agreement.
- the rights management components 170 can also be configured to detect copying of the content to another portable media such as, for example, a CD-ROM or a DVD disc.
- Certain hardware units 218 can also include the ability to detect whether portable media are originals or copies of an original. In such instances, the hardware unit 218 can suspend access to the content 216 upon detecting that the medium is not an original. Oftentimes, errors and malfunctions can result in false detection of a violation of the license agreement.
- the third party 214 is selected to be an arbiter (or moderator) who is trusted by both the content provider 210 and the user 212.
- the third party 214 can be a bank, legal entity, organization, etc., trusted to resolve issues between the content provider 210 and users 212 of the content.
- the third party can also be an organization established solely for purposes of resolving such disputes.
- the function of the arbiter can be implemented through appropriate software using secure and/or encrypted methodologies. Having such a third party eliminates, or at least substantially reduces, the possibility of the content provider's, or the user's, rights being violated.
- the information can subsequently be used by the content provider 210 to prove that the user 212 actually used the content (and enhance damages) in the case where unauthorized use can be proven.
- the third party 214 can optionally request that the user 212 accept the terms of a new agreement indicating that the user 212 believes his rights to have been violated, and that the user 212 has a legitimate right to access the content 216. Alternatively, the third party 214 can request that the user 212 re-accept the terms of the original license agreement. Once the user 212 accepts the terms, the third party 214 will submit a new key, or similar information, to re-enable the user's access to the content 216.
- the third party 214 can request that the user 212 submit the original electronic license agreement for various types of verification.
- certain content providers 210 can designate a specific third party 214 to resolve disputes with users 212.
- the content provider 210 could, for example, request that the third party 214 digitally sign each license that accompanies the content 216.
- the third party 214 upon receiving the license agreement from the user 212, the third party 214 could verify that the license agreement contains third party's 214 digital signature.
- the third party 214 documents information regarding the suspension notice and the provision of a new key to the user 212.
- the new key can be designed such that it provides the user 212 with either temporary or permanent access to the content 216.
- the user 212 In the case of temporary access, if the dispute between the user 212 and the content provider 210 cannot be resolved within the term of the new key received from the third party 214, the user 212 would have an option to submit a new complaint to the third party 214 and obtain another temporary key while the dispute is being resolved. Again, the third party 214 would document all transactions with the user 212 and all keys generated. The third party 214 reports all documented incidents to the content provider 210.
- the content provider 210 examines all information received from the third party 214, including details of the suspension notice and the key provided to the user 212. Based on this information, the content provider 210 can decide whether or not the user has been wrongly accused of violating the terms of the license agreement and, for example, either cancel any temporary keys or restore the user's access rights.
- the user 212 accepts the terms of the license and provides an appropriate indication to the third party.
- the indication can be in the form of an acknowledgment (or selection of appropriate buttons in the case of a click- wrap license), a signed agreement, and/or a digitally signed response.
- the third party 214 can also request that the user 212 re-sign or re-accept the terms of the original license agreement. In some instances, the third party 214 may only review the notice, and request that the user 212 verify or acknowledge its contents. Furthermore, the third party 214 can request that the user 212 provide the original key that was included with contents such as software programs. This is illustrated at step 318.
- the user 212 transmits the original key to the third party 214.
- the third party 214 would provide a permanent key to the user 212 to prevent further discontinuities in the user's access to the content 216.
- the third party 214 documents all relevant information related to the transaction. The information can include, for example, the user's name and other pertinent information, proof of ownership of the content, and/or the user's reasons for believing that the license agreement has not been violated.
- the third party 214 notifies the content provider 210 of the transaction. More particularly, the third party 214 would submit all (or an appropriate portion of) the documented information to the content provider 210, as well as information relating to the new key that has been provided to the user 212.
- step 330 the rights management component 170 continually monitors the hardware unit to determine if the key has expired or, under appropriate circumstances, whether the user 212 has again violated the terms of the license agreement. If no violation is detected, then the user 212 is allowed to continue accessing the content 216. This process continues until the new key either expires or a violation is detected. Once the key has expired, the user's rights would be suspended as indicated at step 332. Again, if this is believed to be an error, then the process would begin again at step 320 where the third party 214 would receive a new suspension notice from the user 212.
- Figure 4 illustrates the steps performed in managing the rights to a digital (i.e. electronic) content according to an embodiment of the present invention.
- the process begins at step 400. This corresponds to the point where the user 212 is involved in a transaction to obtain the content 216 from the content provider 210, or appropriate retailer, distributor, etc.
- the user 212 receives the content 216 at step 410.
- the user 212 must review and accept the terms of a license agreement provided by the content provider 210.
- the rights management component i.e., monitoring software
- the encrypted qualifier would then be stored on the hardware unit 218 at step 422.
- Various steps can also be taken to detect tampering and/or create a relationship between the encrypted qualifier and the hardware unit 218 with necessarily relying on a hardware ID.
- the encrypted qualifier would typically be stored on the computer's hard drive or similar storage device.
- the encrypted qualifier could be stored, for example, on a removable memory card such as secured digital, multi-media, compact-flash, etc.
- the rights management component 170 can check to see if the encrypted qualifier exists on the hardware unit 218. If the encrypted qualifier does not exist, this would signify that the content is being used on a different machine than originally intended. The rights management component 170 can periodically verify that the encrypted qualifier indeed matches up with the content provider's public key as part of a routine test for tampering. Once the encrypted qualifier is stored on the hardware unit 218, the user 212 is allowed to access the content at step 414. Alternatively, once the user accepts the terms of the license, access can be provided to the content.
- step 424 the rights management component 170 checks for a violation of the license agreement. If no violation has occurred, then the user 212 is provided continued access to the content 216. However, if a violation is detected, then the user's access is suspended at step 426. The user 212 then has an option to transmit a suspension notice to a trusted party, i.e., the third party 214. In general, the user would only transmit such a suspension notice if it is believed that the license agreement has not been violated. Users who illegally obtain the content 216 would not send a suspension notice (or would not send a valid suspension notice) to the trusted party.
- the third party 214 documents the incident. As previously discussed, this step involves storing at least all the information submitted by the user 212 for later use. The third party 214 can store additional information, as deemed necessary.
- the trusted party 214 can notify the content provider 210 that a suspension notice has been received. The third party 214 would further submit all, or appropriate, information regarding the suspension notice to the content provider 210.
- a replacement (or new) key is generated for the user 212. As previously indicated the replacement key can provide the user 212 either temporary or permanent access to the content 216.
- step 436 the replacement key is transmitted to the user 216.
- control returns to step 414 where the user 212 is again allowed access to the content 216.
- This process can continue until the content provider 210 and user 212 reach a resolution to the dispute regarding the license agreement.
- the user 212 can be provided with a key which allows permanent access to the content, and further actions would be unnecessary.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/870,547 US7681241B2 (en) | 2004-06-18 | 2004-06-18 | Apparatus and method for managing digital rights with arbitration |
PCT/US2005/021917 WO2006002159A2 (en) | 2004-06-18 | 2005-06-20 | Apparatus and method for managing digital rights with arbitration |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1766565A2 EP1766565A2 (en) | 2007-03-28 |
EP1766565A4 true EP1766565A4 (en) | 2009-08-19 |
Family
ID=35515566
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05762245A Ceased EP1766565A4 (en) | 2004-06-18 | 2005-06-20 | Apparatus and method for managing digital rights with arbitration |
Country Status (3)
Country | Link |
---|---|
US (1) | US7681241B2 (en) |
EP (1) | EP1766565A4 (en) |
WO (1) | WO2006002159A2 (en) |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100640543B1 (en) * | 2004-10-28 | 2006-10-30 | 주식회사 팬택 | Method of Servicing Data Download in the Mobile Communication Network |
JP4471937B2 (en) * | 2005-02-07 | 2010-06-02 | 株式会社ソニー・コンピュータエンタテインメント | Content control method and apparatus by processor resource management |
US8788829B2 (en) | 2006-08-17 | 2014-07-22 | Aol Inc. | System and method for interapplication communications |
US20080046378A1 (en) * | 2006-08-18 | 2008-02-21 | Siemens Aktiengesellschaft | System and method for selling software on a pay-per-use basis |
US8332327B2 (en) * | 2006-10-31 | 2012-12-11 | Core Wireless Licensing S.A.R.L. | Legal text distribution and processing in mobile broadcasting |
US8548168B2 (en) * | 2007-07-19 | 2013-10-01 | Vixs Systems, Inc. | Security module for securing an encrypted signal with system and method for use therewith |
US20090094147A1 (en) * | 2007-10-09 | 2009-04-09 | Fein Gene S | Multi-Computer Data Transfer and Processing to Support Electronic Content Clearance and Licensing |
US8185959B2 (en) * | 2008-02-26 | 2012-05-22 | International Business Machines Corporation | Digital rights management of captured content based on capture associated locations |
US8321948B2 (en) * | 2008-03-28 | 2012-11-27 | Sap Ag | Flexible appliance hosting with coordination of deployment, licensing and configuration |
US20090313556A1 (en) * | 2008-06-13 | 2009-12-17 | Hamilton Ii Rick A | Redistribution of licensed items in a virtual universe |
US8321958B1 (en) | 2008-07-30 | 2012-11-27 | Next It Corporation | Detecting presence of a subject string in a target string and security event qualification based on prior behavior by an end user of a computer system |
JP4636144B2 (en) * | 2008-08-29 | 2011-02-23 | 富士ゼロックス株式会社 | Information management program and information management system |
JP5206795B2 (en) * | 2008-10-21 | 2013-06-12 | 富士通株式会社 | Information processing system and unified usage right management method |
WO2013095573A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Activation and monetization of features built into storage subsystems using a trusted connect service back end infrastructure |
US9419976B2 (en) * | 2011-12-22 | 2016-08-16 | Intel Corporation | Method and apparatus to using storage devices to implement digital rights management protection |
US9483488B2 (en) | 2012-12-20 | 2016-11-01 | Bank Of America Corporation | Verifying separation-of-duties at IAM system implementing IAM data model |
US9639594B2 (en) | 2012-12-20 | 2017-05-02 | Bank Of America Corporation | Common data model for identity access management data |
US9529629B2 (en) | 2012-12-20 | 2016-12-27 | Bank Of America Corporation | Computing resource inventory system |
US9477838B2 (en) | 2012-12-20 | 2016-10-25 | Bank Of America Corporation | Reconciliation of access rights in a computing system |
US9542433B2 (en) | 2012-12-20 | 2017-01-10 | Bank Of America Corporation | Quality assurance checks of access rights in a computing system |
US9537892B2 (en) | 2012-12-20 | 2017-01-03 | Bank Of America Corporation | Facilitating separation-of-duties when provisioning access rights in a computing system |
US9189644B2 (en) | 2012-12-20 | 2015-11-17 | Bank Of America Corporation | Access requests at IAM system implementing IAM data model |
US9495380B2 (en) | 2012-12-20 | 2016-11-15 | Bank Of America Corporation | Access reviews at IAM system implementing IAM data model |
US9489390B2 (en) | 2012-12-20 | 2016-11-08 | Bank Of America Corporation | Reconciling access rights at IAM system implementing IAM data model |
US9071429B1 (en) * | 2013-04-29 | 2015-06-30 | Amazon Technologies, Inc. | Revocable shredding of security credentials |
US10636036B1 (en) * | 2014-02-11 | 2020-04-28 | Lee Anthony Greer | Copyright clearinghouse system and method |
US10757216B1 (en) | 2015-02-20 | 2020-08-25 | Amazon Technologies, Inc. | Group profiles for group item recommendations |
US11363460B1 (en) * | 2015-03-03 | 2022-06-14 | Amazon Technologies, Inc. | Device-based identification for automated user detection |
WO2017015130A1 (en) * | 2015-07-17 | 2017-01-26 | Monotype Imaging Inc. | Providing font security |
US11797554B2 (en) * | 2015-08-10 | 2023-10-24 | Yellcast, Inc. | Providing rich, qualified search results with messaging between buyers and sellers |
TWI601029B (en) * | 2016-12-09 | 2017-10-01 | Chunghwa Telecom Co Ltd | Advanced Electronic Signature Specific Use Declaring System and Method |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5553239A (en) | 1994-11-10 | 1996-09-03 | At&T Corporation | Management facility for server entry and application utilization in a multi-node server configuration |
US5684620A (en) * | 1996-01-30 | 1997-11-04 | Schoonscan, Inc. | High resolution imaging system and method of imaging using the same |
US20010011253A1 (en) * | 1998-08-04 | 2001-08-02 | Christopher D. Coley | Automated system for management of licensed software |
US5864620A (en) | 1996-04-24 | 1999-01-26 | Cybersource Corporation | Method and system for controlling distribution of software in a multitiered distribution chain |
US5828876A (en) | 1996-07-31 | 1998-10-27 | Ncr Corporation | File system for a clustered processing system |
US6442688B1 (en) | 1997-08-29 | 2002-08-27 | Entrust Technologies Limited | Method and apparatus for obtaining status of public key certificate updates |
US6438690B1 (en) | 1998-06-04 | 2002-08-20 | International Business Machines Corp. | Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system |
US6934393B2 (en) | 2000-06-09 | 2005-08-23 | Northrop Grumman Corporation | System and method for third party recovery of encryption certificates in a public key infrastructure |
US20020161997A1 (en) * | 2001-04-26 | 2002-10-31 | Fujitsu Limited | Content distribution system |
US7768549B2 (en) * | 2001-06-08 | 2010-08-03 | Honeywell International Inc. | Machine safety system with mutual exclusion zone |
US9286445B2 (en) * | 2003-12-18 | 2016-03-15 | Red Hat, Inc. | Rights management system |
-
2004
- 2004-06-18 US US10/870,547 patent/US7681241B2/en active Active
-
2005
- 2005-06-20 EP EP05762245A patent/EP1766565A4/en not_active Ceased
- 2005-06-20 WO PCT/US2005/021917 patent/WO2006002159A2/en not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
The technical aspects identified in the present application are considered part of the common general knowledge. Due to their notoriety no documentary evidence is found to be required. For further details see the accompanying Opinion and the reference below. * |
Also Published As
Publication number | Publication date |
---|---|
EP1766565A2 (en) | 2007-03-28 |
US20060005256A1 (en) | 2006-01-05 |
US7681241B2 (en) | 2010-03-16 |
WO2006002159A2 (en) | 2006-01-05 |
WO2006002159A3 (en) | 2006-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7681241B2 (en) | Apparatus and method for managing digital rights with arbitration | |
US7073197B2 (en) | Methods and apparatus for protecting information | |
US7680743B2 (en) | Software application protection by way of a digital rights management (DRM) system | |
JP4039923B2 (en) | Software execution management device, software execution management method, and software execution management program | |
KR101219819B1 (en) | Flexible licensing architecture for licensing digital application | |
EP1342149B1 (en) | Method for protecting information and privacy | |
US9246916B2 (en) | Specifying rights in a digital rights license according to events | |
KR101219839B1 (en) | Flexible licensing architecture in content rights management systems | |
US7080410B2 (en) | Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client | |
JP4406190B2 (en) | Secure video card for a computing device having a digital rights management (DRM) system | |
US7134144B2 (en) | Detecting and responding to a clock rollback in a digital rights management system on a computing device | |
US7103574B1 (en) | Enforcement architecture and method for digital rights management | |
US20060167814A1 (en) | Enforcement architecture and method for digital rights management | |
US20040039705A1 (en) | Distributing a software product activation key | |
JP2007531127A (en) | Digital license sharing system and sharing method | |
JP2004086588A (en) | Software malpractice preventing system | |
KR20070022257A (en) | Digital license sharing system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20061220 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20090721 |
|
17Q | First examination report despatched |
Effective date: 20110224 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20130423 |